CompTIA Security+: Implementing Secure Protocols & Application Security Solutions
CompTIA
| Intermediate
- 11 videos | 48m 32s
- Includes Assessment
- Earns a Badge
In this CompTIA Security+ SY0-601 course, you'll explore a variety of core secure protocols. You'll examine Domain Name System Security Extension (DNSSEC), SSH, Secure/Multipurpose Internet Mail Exchanger (S/MIME), Secure Real-time Protocol (SRTP), LDAPS, File Transfer Protocol Secure (FTPS), Secured File Transfer Protocol (SFTP), Simple Network Management Protocol version 3 (SNMPv3), Hypertext Transfer Protocol over SSL/TLS (HTTPS), IPsec, Authentication Header (AH), and Encapsulated Security Payload (ESP) and its tunnel/transport modes. You'll move on to list several use cases for these concepts. You'll then describe endpoint protection, boot integrity mechanisms, database security mechanisms, and hardening targets. Finally, you'll identify several advanced application security techniques. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe an array of secure protocols including dnssec, ssh, s/mime, srtp, ldaps, ftps, sftp, and snmpv3Describe ipsec in terms of authentication header (ah), encapsulated security payload (esp), and tunnel vs. transport modeList various use cases which include voice and video, time synchronization, email, web, file transfer, directory services, and remote accessDescribe endpoint protection in terms of antivirus, anti-malware, rde, dlp, next-generation firewalls, hids, and hipsOutline boot integrity mechanisms such as boot security/unified extensible firmware interface (uefi), measured boot, and boot attestation
-
Recognize specific database security mechanisms like tokenization, salting, and hashingDefine various application security measures like input validations, secure cookies, code signing, whitelisting, and blacklistingDescribe hardening targets like open ports and services, registry, disk encryption, and patch managementIdentify advanced application security techniques like self-encrypting drives (sed), full-disk encryption (fde), opal, hardware root of trust, trusted platform module (tpm), and sandboxingSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 39s
-
13m 25sUpon completion of this video, you will be able to describe an array of secure protocols including DNSSEC, SSH, S/MIME, SRTP, LDAPS, FTPS, SFTP, and SNMPv3. FREE ACCESS
-
5m 24sAfter completing this video, you will be able to describe IPsec in terms of the Authentication Header (AH), the Encapsulated Security Payload (ESP), and tunnel vs. transport mode. FREE ACCESS
-
2m 23sUpon completion of this video, you will be able to list various use cases which include voice and video, time synchronization, email, web, file transfer, directory services, and remote access. FREE ACCESS
-
11m 21sUpon completion of this video, you will be able to describe endpoint protection in terms of antivirus, anti-malware, remote device encryption, data loss prevention, next-generation firewalls, host-based intrusion detection systems, and host-based intrusion prevention systems. FREE ACCESS
-
1m 35sLearn how to outline boot integrity mechanisms such as boot security/Unified Extensible Firmware Interface (UEFI), measured boot, and boot attestation. FREE ACCESS
-
2m 33sAfter completing this video, you will be able to recognize specific database security mechanisms, like tokenization, salting, and hashing. FREE ACCESS
-
4m 48sFind out how to define various application security measures like input validations, secure cookies, code signing, whitelisting, and blacklisting. FREE ACCESS
-
1m 20sUpon completion of this video, you will be able to describe hardening targets such as open ports and services, registry, disk encryption, and patch management. FREE ACCESS
-
3m 22sLearn how to identify advanced application security techniques like self-encrypting drives (SED), full-disk encryption (FDE), Opal, hardware root of trust, Trusted Platform Module (TPM), and sandboxing. FREE ACCESS
-
42s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.